Blog

Microsoft Expanded Cloud Logs Implementation Playbook

Microsoft's Expanded Cloud Logs Implementation Playbook details new logging capabilities in Microsoft Purview Audit for detecting intrusions. It allows organizations to access critical events (like mail activity) and integrate logs into SIEM systems. Aimed at technical personnel, it guides operationalizing these logs in M365 to enhance cybersecurity. Initially available to select federal agencies, now accessible for E3/G3 customers. Feedback can be directed to CISA’s FEIT.

https://www.cisa.gov/resources-tools/resources/microsoft-expanded-cloud-logs-implementation-playbook

Cybersecurity: Why Protecting Public Data Is Critical

Cybersecurity is critical due to diverse threats targeting public institutions, which hold sensitive data. Organizations must implement robust strategies to protect information systems while ensuring service continuity and citizen rights. France, Poland, and Italy have developed differing approaches, emphasizing critical infrastructure protection and public awareness. The evolving cyber threat landscape demands continuous adaptation and cooperation among EU nations to safeguard citizens and institutions against attacks.

https://www.polytechnique-insights.com/en/columns/digital/cybersecurity-why-protecting-public-data-is-critical/

Bolstering the Cybersecurity of the Healthcare Sector

EU launches Action Plan to enhance healthcare cybersecurity, addressing 309 incidents in 2023. Focus on prevention, detection, and mitigation of threats, covering hospitals and general practices. Establishing a pan-European Cybersecurity Support Centre for tailored guidance over two years. Aim: secure digital healthcare, protecting patient care and lives.

https://commission.europa.eu/news/bolstering-cybersecurity-healthcare-sector-2025-01-15_en

Navigating Evolving Threats in 2025: eCrime Ecosystem Adapts and Proliferates, Geopolitical Volatility To Fuel Cyber Threats

TLDR: In 2025, the cyber threat landscape will evolve due to a fragmented eCrime ecosystem driving mass-targeting cyberattacks, particularly against small and medium enterprises. AI will be crucial for social engineering and disinformation, while geopolitical tensions, especially between Russia, China, and the US, will fuel espionage and cyber operations, notably influencing elections in Germany and Poland. Ransomware and infostealer activities are expected to persist, despite law enforcement disruptions, with sophisticated techniques like BYOVD becoming more common.

https://quointelligence.eu/2025/01/navigating-evolving-threats-in-2025/

Passkeys: They’re Not Perfect but They’re Getting Better

Passkeys are emerging as a secure alternative to passwords for online authentication, but challenges remain for widespread adoption, including inconsistent support, user device loss concerns, migration issues, and varying account recovery processes. The NCSC supports improving passkey technologies and standardization while encouraging organizations to offer them. Despite current limitations, passkeys enhance security by being unique, not phishable, and offering faster sign-ins compared to traditional methods, positioning them as the future of authentication.

https://www.ncsc.gov.uk/blog-post/passkeys-not-perfect-getting-better

Study Reveals CIO Tactics to Boost IT-business Collaboration

CIOs can enhance IT-business collaboration by fostering mutual understanding between IT and business staff, combining transformational and transactional leadership styles. This approach involves creating cross-domain learning mechanisms while retaining domain-specific expertise, essential for driving organizational change and achieving alignment.

https://phys.org/news/2025-01-reveals-cio-tactics-boost-business.html

OpenAI’s O3 Model for ChatGPT Leaves Computer Science Students Anxious

OpenAI's o3 model raises anxiety among computer science majors fearing job loss to AI. Users express concerns on social media about their future careers. Despite this, experts believe new opportunities will emerge as AI automates tedious tasks, allowing higher-level work. While CS majors are growing in numbers, many doubt AI's positive impact on job creation. High costs associated with o3 raise concerns, but some believe AI will ultimately liberate workers from mundane tasks.

https://www.axios.com/2025/01/07/openai-o3-college-students-computer-science

I Did a LinkedIn 30-day Challenge—here’s What I Learned

TLDR:

Kiran Shahid completed a 30-day LinkedIn posting challenge to grow her following to 10,000. She shared insights on creating a structured content strategy, engaging authentically, and managing execution challenges. Results included reaching 114,608 people and gaining 485 followers, indicating that consistency and variety in content types led to higher engagement. Future plans involve a sustainable posting rhythm of four quality posts weekly, leveraging lessons learned for ongoing audience connection.

https://zapier.com/blog/linkedin-challenge/

CIOs: Your AI Tech Stack Needs a New Look

CIOs should rethink AI tech stacks, transitioning from a traditional structure to a “tech sandwich” model, which incorporates data and AI from various sources for a comprehensive approach. Key components include data management, AI applications (embedded, built, and BYOAI), and risk mitigation through a TRiSM layer. Three archetypes exist: vendor-packaged for smaller enterprises, TRiSM-rich for regulated industries, and deluxe for large enterprises. This concept aids governance, IT planning, and resource allocation essential for executing AI strategies effectively.

https://www.gartner.com/en/articles/ai-tech-stack

Scroll to Top